IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Multimedia (View All Report Types)
1 - 25 of 179 Matches Previous Page  |  Next Page
Endpoint Protection Plus Webinar
sponsored by Ziften
WEBCAST: Endpoint protection can be complex and leave your organization vulnerable to attackers. This is because most endpoints aren't patched or users disable security tools. In this webcast, listen as Ziften's Roark Pollock and Logan Gilbert discuss 10 things to consider when looking at endpoint protection platforms.
Posted: 16 Apr 2019 | Premiered: Apr 16, 2019

Ziften

A Framework for Data Privacy Survival
sponsored by ASG Technologies Group Inc
WEBCAST: Protecting customer data has become increasing difficult due the cyberattack explosion, increasing hacker creativity and the growing amounts of data. In this webcast, listen as Ian Rowlands from ASG Technologies and Kevin Moos from Primitive Logic discuss an integrated framework for customer privacy.
Posted: 11 Apr 2019 | Premiered: Mar 31, 2019

ASG Technologies Group Inc

Webinar: What's New in iOS 12 Security
sponsored by Data Theorem
WEBCAST: This webcast led by Phillip Tennen of Data Theorem explores the major changes in Apple's iOS 12. Watch now to learn about new security and privacy changes, how to take advantage of these changes and best practices to continuously improve privacy and data security for mobile apps.
Posted: 10 Apr 2019 | Premiered: Oct 22, 2018

Data Theorem

Automate Compliance Audits Without the Staff
sponsored by Data Theorem
WEBCAST: Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.
Posted: 09 Apr 2019 | Premiered: Feb 1, 2019

Data Theorem

Shipping Fast
sponsored by Trend Micro, Inc.
WEBCAST: In the security world, you don't normally hear people talking about moving fast. However, a modern and resilient security strategy is just as fast as the rest of your business. In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses the benefits of reducing the number of security tools your team uses.
Posted: 05 Apr 2019 | Premiered: Apr 5, 2019

Trend Micro, Inc.

Run Applications Anywhere
sponsored by Trend Micro, Inc.
WEBCAST: In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses how you can implement a simpler strategy for maintaining security while running your applications in any environment.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019

Trend Micro, Inc.

Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST: Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019

Trend Micro, Inc.

Stopping the Exfiltration of Sensitive Data from the Browser
sponsored by Instart
VIDEO: In this webinar, learn how stopping the exfiltration of data from the browser can help you protect your customer's and their most sensitive data today.
Posted: 01 Apr 2019 | Premiered: 01 Apr 2019

Instart

Regulation, Innovation and Financial Services
sponsored by Onfido
VIDEO: Thanks to a recent spate of data breaches, SSNs and other traditional identifiers are no longer fit for purpose. But without identity verification, new customers can't be on boarded. Tune into this webinar to learn why passive data proofing is no longer enough – and which authentication approaches to avoid.
Posted: 29 Mar 2019 | Premiered: 29 Mar 2019

Onfido

Cloud Security: Don't Go Blind While Playing in the Cloud
sponsored by Ziften
WEBCAST: Clouds are an intense security target because of their concentration of information. Why would hackers target multiple different companies when they can go to the cloud data center and see the same target opportunity? In this webcast, listen as Dr. Al Hartmann and Michael Levin discuss 6 security tips for moving enterprise apps to the cloud.
Posted: 27 Mar 2019 | Premiered: Mar 27, 2019

Ziften

Avast Business Secure Web Gateway
sponsored by Avast Business
WEBCAST: It's no secret that users pose one of the biggest threats to business security today – whether it's clicking on suspicious email links or visiting unsafe websites. In this webcast, learn how the new Avast Business Secure Web Gateway protects SMBs from sophisticated web threats while being easily manageable and fully scalable.
Posted: 15 Mar 2019 | Premiered: Mar 4, 2019

Avast Business

Privacy and Data Protection Podcast
sponsored by Micro Focus & PwC
PODCAST: There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this podcast, learn about challenges in privacy and data protection and how PwC meets these challenges head on.
Posted: 12 Mar 2019 | Premiered: Mar 7, 2019

Micro Focus & PwC

Privacy and Data Protection Webinar
sponsored by Micro Focus & PwC
WEBCAST: There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this webcast, learn about challenges in privacy and data protection and how to meet these challenges head on.
Posted: 08 Mar 2019 | Premiered: Mar 8, 2019

Micro Focus & PwC

Cryptojacking
sponsored by Symantec
WEBCAST: Cryptojacking can be a nuisance to your employees but, more importantly, these attacks can result in unexpected increases in your business costs. There are two types of cryptojacking attacks: file-based and browser-based attacks. In this webcast, walk through how a typical browser-based cryptojacking scenario might play out.
Posted: 06 Mar 2019 | Premiered: Mar 6, 2019

Symantec

Malicious Power Shell Usage
sponsored by Symantec
WEBCAST: In living-off-the-land attacks, attackers take advantage of common tools living in your network. One common type of a living-off-the-land attack is a PowerShell attack. This webcast shows how PowerShell attacks take place and how your organization can avoid being a target.
Posted: 05 Mar 2019 | Premiered: Mar 5, 2019

Symantec

The Five Most Creative Ways that Organizations are Using Advanced Authentication
sponsored by Micro Focus
VIDEO: In this webinar, hear from identity and access management experts, Kent Purdy and Troy Drewry, about the new ways organizations are using the latest authentication technologies and how they're preparing the future.
Posted: 04 Mar 2019 | Premiered: 04 Mar 2019

Micro Focus

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
WEBCAST: There have been a number of data breaches in the news recently due to website vulnerabilities. In order to ensure your business isn't breached, incorporate security into your development process. In this webcast, explore key considerations for securing your web applications.
Posted: 01 Mar 2019 | Premiered: Mar 1, 2019

WhiteHat Security

Game Changing Defensive Strategies for 2019
sponsored by Fidelis
WEBCAST: Security boundaries have extended to cloud service provider environments where perimeters no longer exist. Therefore, organizations cannot defend themselves with the same strategies they did. In this webcast, learn how organizations can evolve their security approach to defend them from the threats of today.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

Fidelis

Insider Threats Part 1: Identifying and Responding with Fidelis EDR Technology
sponsored by Fidelis
WEBCAST: Sometimes the biggest threat to your sensitive data is one of your own employees. In this webcast, Fidelis' Lucas Chumley and Louis Smith will demonstrate how to minimize the risk posed by an insider threat. Also, see how Fidelis technology can help identify and provide initial notification of a probable threat and then automate response.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

Fidelis

Your App Security Stack: How to Defend Against the Evolving Threat
sponsored by Arxan
WEBCAST: In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

Arxan

Trust But Verify: Mobile App Protection Best Practices
sponsored by Arxan
WEBCAST: This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

Arxan

The Power of Bro and Why You Should Include It in Your Security Infrastructure
sponsored by Corelight
VIDEO: Tune into this webinar as Matt Bromiley of SANS Institute and Seth Hall of CoreLight explain the power of Bro (now known as Zeek), where it fits in the security landscape and how it can help incident responders do their jobs quickly and effectively.
Posted: 11 Feb 2019 | Premiered: 11 Feb 2019

Corelight

Cyber Global Warming Real Life Malscape Insights
sponsored by Dell SecureWorks
WEBCAST: In this webcast, learn how you can measure your cyber-resilience with behavioral intelligence.
Posted: 07 Feb 2019 | Premiered: Oct 2, 2018

Dell SecureWorks

How Cybercriminals are Adapting to Outwit Defenses
sponsored by Dell SecureWorks
WEBCAST: From July 2017 through June 2018, SecureWorks Counter Threat Unit researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. In this webcast, gain insight on the key findings from the report.
Posted: 06 Feb 2019 | Premiered: Dec 5, 2018

Dell SecureWorks

An Overview of Endpoint Detection & Response (EDR)
sponsored by Trend Micro, Inc.
WEBCAST: ESG Senior Principal Analyst Jon Oltsik discusses an overview of Endpoint Detection & Response (EDR) in the market, including trends, challenges, and how automation can help.
Posted: 06 Feb 2019 | Premiered: Mar 23, 2018

Trend Micro, Inc.
1 - 25 of 179 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement